SB2018120417 - Multiple vulnerabilities in Radare radare2
Published: December 4, 2018 Updated: July 17, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2018-20455)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a stack-based buffer overflow) by crafting an input file, a related issue to CVE-2018-20456. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Stack-based buffer overflow (CVE-ID: CVE-2018-20456)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Out-of-bounds read (CVE-ID: CVE-2018-20458)
The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.
In radare2 prior to 3.1.1, r_bin_dyldcache_extract in libr/bin/format/mach0/dyldcache.c may allow attackers to cause a denial-of-service (application crash caused by out-of-bounds read) by crafting an input file.
4) Out-of-bounds read (CVE-ID: CVE-2018-20461)
The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.
In radare2 prior to 3.1.1, core_anal_bytes in libr/core/cmd_anal.c allows attackers to cause a denial-of-service (application crash caused by out-of-bounds read) by crafting a binary file.
5) Out-of-bounds read (CVE-ID: CVE-2018-19843)
The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.
opmov in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2.
Remediation
Install update from vendor's website.
References
- https://github.com/radare/radare2/commit/9b46d38dd3c4de6048a488b655c7319f845af185
- https://github.com/radare/radare2/issues/12373
- https://github.com/radare/radare2/issues/12372
- https://github.com/radare/radare2/commit/4e98402f09a0ef0bb8559a33a4c1988c54938eaf
- https://github.com/radare/radare2/issues/12374
- https://github.com/radare/radare2/commit/a1bc65c3db593530775823d6d7506a457ed95267
- https://github.com/radare/radare2/issues/12375
- https://github.com/radare/radare2/commit/f17bfd9f1da05f30f23a4dd05e9d2363e1406948
- https://github.com/radare/radare2/issues/12242